Glossary
A comprehensive glossary of key cybersecurity terms, including encryption, phishing, and intrusion detection systems, to enhance your security knowledge
Spoofing
Spoofing is any act where an attacker disguises as a trusted entity and wins the victim’s trust so he can execute malicious actions.
Read more: What Is Spoofing | Cybersecurity | CompTIA
SQLi
SQL injection (Structured Query Language Injection) is a code injection attack where unauthorized database commands are performed on a victim’s SQL database.
Read more: What is SQL Injection (SQLi) and How to Prevent Attacks (acunetix.com)
SSL
SSL, short for Secure Sockets Layer, is the protocol used to establish a secure communication between the web server and the web client. It can also be used to secure email, VoIP, and other communications over unsecured networks.
Read more: How does SSL work? | SSL certificates and TLS | Cloudflare
SSRF
SSRF, short for Server-Side Request Forgery, is a common cyber-attack which allows a hacker to exploit the functionality of a server. This vulnerability is highly threatening because it can be used to target internal systems protected by firewalls and inaccessible by an external network.
Read more: What is server-side request forgery (SSRF)? | Acunetix
Threat
Any event that can adversely affect an organization’s operations or assets through unauthorized access through an information system.
Read more: Cyber Threat – Glossary | CSRC (nist.gov)
Vulnerability
A vulnerability is a mistake in a software that can be directly exploited by a cybercriminal to gain unauthorized access to a system.
Read more: vulnerability – Glossary | CSRC (nist.gov)
Vulnerability Scanning
Vulnerability scanning is an activity that identifies and reports any vulnerabilities present in a system that a hacker can exploit.
Read more: Penetration testing vs vulnerability scanning | Acunetix
WAF
Web Application Firewall (WAF) is a security tool used to secure web applications from common cyber-attacks by filtering and monitoring HTML traffic entering a web application.
Read more: What is a WAF? | Web Application Firewall explained | Cloudflare
Weakness
A weakness is a flaw or error in a software or hardware system that can create a vulnerability if left unevaluated.
Read more: CWE – Frequently Asked Questions (FAQ) (mitre.org)
XSS
Cross-site scripting (XSS) is a type of injection attack where malicious scripts are injected into a web browser of a victim. The actual attack occurs when the victim visits the web page or web application that executes the malicious code.
Read more: What is Cross-site Scripting and How Can You Fix it? (acunetix.com)
Zero-Day Exploit
A zero-day exploit is a software vulnerability discovered and exploited by a hacker before it’s been known to the party interested in fixing it.
Read more: What is a zero-day exploit? | Norton
Let us show you how we can help your organization
For starters, we can show how to improve upon your existing security in 30 mins. Care to proceed?